Access Control

Discover access control, include the articles, news, trends, analysis and practical advice about access control on alibabacloud.com

Windows Azure AppFabric Introductory Teaching series (V): A preliminary study of access control Service

This article is the fifth article in the introductory teaching of Windows Azure AppFabric. This article provides a preliminary explanation of access control Service (ACS) in AppFabric. For subsequent learning to proceed smoothly make sure that you have browsed through the first article of this tutorial, and that you have completed the creation of the AppFabric project and namespace in this article. We know that Appfabirc by service bus and Access control ...

A cloud access control system based on privacy protection

A cloud access control system based on privacy protection Nanjing University of Posts and telecommunications Shaojiu This paper presents a new access control model in cloud computing environment, which can not only provide efficient and flexible access control strategy in complex and changeable cloud environment, but also have the ability to protect the privacy data in Mah-abe. This paper focuses on the principle of the ABE encryption algorithm, in the attribute allocation and multi-attribute authority, attribute cancellation three models to do the algorithm to improve, from the performance and security of a number of angles to design a suitable for the cloud computing environment access control model.

Tomoyo Linux 2.4.0 release mandatory access control Linux implementation

Tomoyo Linux is a mandatory http://www.aliyun.com/zixun/aggregation/38609.html "> Access control (MAC) Linux implementation that can be used to improve system security, It can also be done purely as a system analysis tool. It was founded in March 2003 and is sponsored by the NTT Data Corporation of Japan. Tomoyo Linux 2.4.0 This version of the Userland tool has been released. Tomoy ...

Access M.I. 0.7.2 Publishing access control simulator

Access M.I. is a http://www.aliyun.com/zixun/aggregation/38609.html "> Access Control Universal Simulator designed to improve design and IT security audits." It provides GNU (component and file system rights) simulations, MySQL servers (components and permissions), and a common role-based access control application. It is used primarily for databases, system and application administrators, it architects and developers, and auditors. ...

Document] A gateway-based Access control Scheme for collaborative clouds

A gateway-based Access control Scheme for collaborative clouds Yongdong Wu, Vivy Suhendra, Huaqun Guo This monitors presents a virt UAL Private cloud for collaborative clouds based on sec ...

Research on SaaS access control and scheduling strategy in cloud computing environment

Research on SaaS access control and scheduling strategy in cloud computing environment Li, Yang from there, Wuhao, PEI. This paper expounds the basic concept of SaaS, introduces the reference structure and service flow of SaaS, analyzes and summarizes the access control strategies of different types of service requirements, sums up the scheduling strategies of different performance requirements,   Finally, based on the research results of SaaS access control and scheduling strategy in the existing cloud computing environment, the future research direction and the key problems that need to be solved are prospected. Keywords: cloud computing, software as a service ...

Research on access control conflict detection for Intelligent City Information System

Research on access control conflict detection for Intelligent City Information System Han Sanga in the background of Intelligent city, the information system needs resources sharing and cooperative operation, and the traditional access control technology faces new demands and challenges. Based on the RBAC model, this paper introduces the element of "application", which includes different roles and permissions, and realizes the unified authorization by giving the people the roles that belong to different applications. At the same time, the model constraint and model parameter configuration as well as the corresponding conflict detection strategy are proposed for the new model, by detecting the basic operation of tree elements, the Role association permissions ...

Packetfence ZEN 3.3.1 Publishing Network access control system

Packetfence ZEN is a trustworthy open source network http://www.aliyun.com/zixun/aggregation/38609.html "> Access control System (NAC). It supports registering new network devices, detecting unusual network activity, isolating problematic devices, correcting controlled ports, registering for Default vulnerability scans, VoIP supporting VLAN isolation (even in heterogeneous environments) multiple switch vendors, supporting 802.1x via fre ...

Packetfence ZEN 3.0 Release Network access control system

Packetfence Zen is a network http://www.aliyun.com/zixun/aggregation/38609.html "> Access control (NAC) system. It supports registering new network devices, discovering unusual network activity, isolating problematic devices, correcting controlled ports, registering as a base and preset vulnerability scans, VOIP supporting VLAN isolation (even in heterogeneous environments) multiple switch vendors, supporting 802.1x through Freeradius ...

A security model of virtual machine access control

A security model for virtual machine access control Liangbiao qin yuan Shen Zhi sheng Chen Lu Yuajiang Yong Guo Evan in many security threats of virtual machine system, the internal security problem brought by resource sharing and data communication becomes the most concerned problem in virtual machine under cloud platform. Combined with Chinese wall and BLP model, a security model of access control for virtual machines is proposed VBAC, and PCW multilevel security model is introduced based on BLP security model.

Packetfence 3.0 Release Network access control system

Packetfence is a trustworthy open Source Network access control system (NAC). It includes a mandatory network portal for registration, corrective, centralized wired and wireless management, support for 802.1X, 2-layer isolation for problematic devices, and a portal correction, integrated with Snort IDs and nessus vulnerabilities scanners. It can be used to effectively protect network security from small to large. Packetfence 3.0 releases a number of new features. Contains a redesigned mandatory network portal, complete ...

Authorization access control of privacy protection in public cloud

Privacy preserving delegated Access control in public clouds Mohamed Nabeel, Elisa Bertino We utilize a efficient group key Management scheme that supports expressive ACPs. Our system assures th ...

Research on access control of management information system based on cloud computing

Research on access control of management information system based on cloud computing Chongqing in this paper, the existing workflow technology and access control model are fully studied, based on the TRBAC model of the most suitable workflow management system, some improvements are made to the model from the angle of application. This model introduces the role concept of role-based access control into task-based access control, the core idea of which is to enable the user to access the data by acquiring a role (but the authorization step that contains the permission must be activated, otherwise the role's permissions will be frozen). ...

Access control of mobile cloud service with privacy protection function

Mobile cloud service access control with privacy protection Jing Po Bai Guangwei Cade Zhang Yi for security and privacy protection issues in mobile cloud services, a mechanism for anonymous use of cloud storage services is proposed. In the Anonymous Identity Registration section, the 0 Knowledge verification and digital signature technology simplifies the key verification step of mobile cloud users, while the third party uses the user to bind with own ID card to prevent users from malicious use of mobile cloud services; In the data Sharing section, the system extracts the shared account parameters, Used to troubleshoot data security degradation caused by shared key loss. Combined with the method of theoretical analysis ...

Research on data access control method in cloud computing

Research on data access control method in cloud computing Nanjing University of Posts and telecommunications This paper proposes an attribute-based access control model (DACC) for cloud computing environment using CP-ABE encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing Service Provider ...

Research and implementation of access control subsystem based on attribute encryption in cloud storage

Research and realization of access control subsystem based on attribute encryption in cloud storage Sun Youpeng because of the complexity of the cloud environment, the various entities are not trusted, so password access control technology to prevent user data leakage is the most direct means. In recent years, the academia has introduced the attribute-based encryption system in the access control, which is a method developed on the basis of identity encryption. This paper chooses the access control technology in cloud storage as the research direction, and deeply analyzes some problems of access control technology based on attribute encryption. Including the lack of access policy expression, permission to withdraw ...

Cloud computing security issues and access control solutions

Cloud Computing Security Issues and Access control FX Young-gi Min, Hyo-jin Shin, Young-hwan Bang at this monitors, the Auth ORS tried to study the threats and attacks ...

Research and application of access control mechanism in cloud computing environment

Research and application of access control mechanism in cloud computing environment University Li Shigang based on the research of traditional access control technology, this paper analyzes the application requirements of access control technology in cloud computing environment. Aiming at the problem of virtual machine security and privilege management in cloud computing environment, a security solution based on access control technology is proposed and implemented. The main work is as follows: 1. This paper studies the application status of the traditional access control technology, analyzes the application status of the access control technology in cloud environment, analyzes its characteristics and analyzes the new requirements under the cloud computing environment. 2. For virtual machine security isolation, ...

Nginx access control and log processing

Nginx http://www.aliyun.com/zixun/aggregation/38609.html "> Access control 1.Nginx ID card Verification #cd/usr/local/nginx/conf#mkdir Htpasswd/usr/local/apache2/bin/htpasswd-c/usr/local/nginx/conf/htpasswd/tongji ...

Distributed access control system 1.4.27 Publishing access controls

Distributed access control system abbreviation DACS is a lightweight single sign-on http://www.aliyun.com/zixun/aggregation/38609.html "> Access controller. It provides flexible, modular authentication methods, powerful, transparent rules based Web service authorization checks, CGI programs, or almost any program. Distributed Access Control ...

Total Pages: 10 1 2 3 4 5 .... 10 Go to: Go

Beyond APAC's No.1 Cloud

19.6% IaaS Market Share in Asia Pacific - Gartner IT Service report, 2018

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.